First published: Wed Feb 04 2009(Updated: )
Cross-domain vulnerability in js/src/jsobj.cpp in Mozilla Firefox 3.x before 3.0.6 allows remote attackers to bypass the Same Origin Policy, and access the properties of an arbitrary window and conduct cross-site scripting (XSS) attacks, via vectors involving a chrome XBL method and the window.eval function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =3.0.4 | |
Firefox | =3.0.5 | |
Firefox | =3.0-beta2 | |
Firefox | =3.0.3 | |
Firefox | =3.0 | |
Firefox | =3.0.1 | |
Firefox | =3.0.2 | |
Firefox | =3.0-beta5 | |
Firefox | =3.0-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0354 is considered to have a medium severity due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2009-0354, upgrade Mozilla Firefox to version 3.0.6 or later.
CVE-2009-0354 allows attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks.
CVE-2009-0354 affects Mozilla Firefox versions 3.0, including alpha and beta versions up to 3.0.5.
The main issue caused by CVE-2009-0354 is the ability to access properties of an arbitrary window, leading to security vulnerabilities.